会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 12. 发明授权
    • Saving and retrieving data based on symmetric key encryption
    • 基于对称密钥加密保存和检索数据
    • US07587589B2
    • 2009-09-08
    • US11557641
    • 2006-11-08
    • Paul EnglandMarcus Peinado
    • Paul EnglandMarcus Peinado
    • H04L29/06
    • G06F21/6218
    • In accordance with certain aspects, data is received from a calling program. Ciphertext that includes the data is generated, using a symmetric cipher, in a manner that allows only one or more target programs to be able to obtain the data from the ciphertext. In accordance with other aspects, a bit string is received from a calling program. An identifier of the calling program is checked to determine whether the calling program is allowed to access data encrypted in ciphertext of the bit string. The integrity of the data is also verified, and the data is decrypted using a symmetric key. The data is returned to the calling program only if the calling program is allowed to access the data and if the integrity of the data is successfully verified.
    • 根据某些方面,从呼叫程序接收数据。 使用对称密码,以允许只有一个或多个目标程序能够从密文获得数据的方式生成包含数据的密文。 根据其他方面,从呼叫程序接收到位串。 检查调用程序的标识符以确定是否允许调用程序访问以位串的密文加密的数据。 还验证数据的完整性,并使用对称密钥对数据进行解密。 只有当主叫程序被允许访问数据并且数据的完整性被成功验证时,才将数据返回给调用程序。
    • 16. 发明授权
    • Protection of content stored on portable memory from unauthorized usage
    • 保护存储在便携式存储器上的内容免于未经授权的使用
    • US07266660B2
    • 2007-09-04
    • US11406180
    • 2006-04-17
    • Marcus Peinado
    • Marcus Peinado
    • G06F12/14
    • G06F21/10
    • A device for securely recording protected content to a portable memory, and for reading the protected content therefrom. The device includes a feature that makes it adapted to read or write specially-configured portable memories that are incompatible with standard read/write devices. For example, the device may be designed to work with memories having an unusual shape or size, or may manipulate the data in a non-standard way before storing it on the memory. The read/write devices are trusted components that will only handle the protected content in accordance with rules governing the content. The feature included in the device is preferably a proprietary and/or hardware feature, so that counterfeit devices incorporating the feature cannot be built without overcoming economic and/or legal hurdles. Because of the hurdles to building devices compatible with the specially-configured portable memory, protected content can be transferred to such a memory with reasonable assurance that the content will not be widely copied.
    • 一种用于将受保护内容安全地记录到便携式存储器并用于从其读取受保护内容的装置。 该设备包括一个功能,使其适合于读取或写入与标准读/写设备不兼容的特殊配置的便携式存储器。 例如,设备可以被设计为与具有不寻常形状或尺寸的存储器一起工作,或者可以在将其存储在存储器之前以非标准方式操纵数据。 读/写设备是只能根据管理内容的规则处理受保护内容的受信任组件。 设备中包括的特征优选地是专有和/或硬件特征,使得并入该特征的假冒设备不能克服经济和/或法律障碍。 由于构建与特殊配置的便携式存储器兼容的设备的障碍,受保护的内容可以被合理地保证内容不会被广泛地复制到这样的存储器中。
    • 17. 发明授权
    • Transferring application secrets in a trusted operating system environment
    • 在受信任的操作系统环境中传送应用程序秘密
    • US07243230B2
    • 2007-07-10
    • US09993340
    • 2001-11-16
    • Paul EnglandMarcus PeinadoDaniel R. SimonJosh D. Benaloh
    • Paul EnglandMarcus PeinadoDaniel R. SimonJosh D. Benaloh
    • H04L9/00
    • G06F21/57G06F21/606
    • Transferring application secrets in a trusted operating system environment involves receiving a request to transfer application data from a source computing device to a destination computing device. A check is made as to whether the application data can be transferred to the destination computing device, and if so, whether the application data can be transferred under control of the user or a third party. If these checks succeed, a check is also made as to whether the destination computing device is a trustworthy device running known trustworthy software. Input is also received from the appropriate one of the user or third party to control transferring of the application data to the destination computing device. Furthermore, application data is stored on the source computing device in a manner that facilitates determining whether the application data can be transferred, and that facilitates transferring the application data if it can be transferred.
    • 在受信任的操作系统环境中传送应用程序秘密涉及接收将应用数据从源计算设备传送到目的地计算设备的请求。 检查应用数据是否可以传送到目的地计算设备,如果是,可以在用户或第三方的控制下传送应用数据。 如果这些检查成功,还要检查目的地计算设备是否是运行已知可靠软件的值得信赖的设备。 还从适当的用户或第三方接收输入以控制将应用数据传送到目的地计算设备。 此外,应用数据以便于确定是否可以传送应用数据的方式存储在源计算设备上,并且如果可以传送应用数据便于传送应用数据。
    • 19. 发明授权
    • Methods and systems for cryptographically protecting secure content
    • 用于密码保护安全内容的方法和系统
    • US07203310B2
    • 2007-04-10
    • US10124922
    • 2002-04-18
    • Paul EnglandMarcus PeinadoNicholas P. Wilt
    • Paul EnglandMarcus PeinadoNicholas P. Wilt
    • H04N7/167
    • G06F21/83G06F21/64G06F21/79
    • Methods and systems are provided for cryptographically protecting secure content in connection with a graphics subsystem of a computing device. Techniques are implemented to encrypt the contents of video memory so that unauthorized software cannot gain meaningful access to it, thereby maintaining confidentiality. Moreover, a mechanism for tamper detection is provided so that there is awareness when data has been altered in some fashion, thereby maintaining integrity. In various embodiments, the contents of overlay surfaces and/or command buffers are encrypted, and/or the GPU is able to operate on encrypted content while preventing its availability to untrusted parties, devices or software.
    • 提供了与计算设备的图形子系统相关联地加密地保护安全内容的方法和系统。 实现技术来加密视频存储器的内容,使得未经授权的软件不能获得对其的有意义的访问,从而保持机密性。 此外,提供用于篡改检测的机制,使得当数据以某种方式被改变时,意识到,从而保持完整性。 在各种实施例中,覆盖表面和/或命令缓冲器的内容被加密,和/或GPU能够对加密内容进行操作,同时防止其对不信任方,设备或软件的可用性。